Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Tutorials
biblio
Analytics at Scale: Evolution at Infrastructure and Algorithmic Levels
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
component
relational database security
Tutorials
styling
style
insert
formatting
Technological innovation
data analysis
Scalability
relational databases
quality of service
composability
Production
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Detection of Phishing and User Awareness Training in Information Security: A Systematic Literature Review
Submitted by grigby1 on Fri, 02/03/2023 - 5:21pm
Training
feature extraction
pubcrawl
Human behavior
Phishing
Firewalls (computing)
visualization
Systematics
Tutorials
Phishing Detection
Phishing mitigation and Quality assurance
Security-awareness
biblio
Resilience, a Key Property of Infrastructure CPS
Submitted by grigby1 on Wed, 04/20/2022 - 11:28am
computer security
CPS resilience
cps resiliency
cyber-physical systems
energy measurement
pubcrawl
resilience
Tutorials
biblio
Cross-Layer Soft-Error Resilience Analysis of Computing Systems
Submitted by grigby1 on Tue, 05/25/2021 - 3:49pm
Circuit faults
CPS resilience
cyber physical systems
Hardware
n/a
pubcrawl
Reliability engineering
resilience
Resiliency
software reliability
Tutorials
biblio
Deductive Verification of Distributed Protocols in First-Order Logic
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
infinite-state systems
verification problem
validity checking
Tutorials
tools
Theorem Proving
SMT solvers
Safety
pubcrawl
Protocols
protocol verification
program verification
privacy
policy-based governance
long standing research goal
logical verification conditions
automated provers
formal verification
Formal Specification
formal logic
first-order logic
distributed systems
distributed protocols
design automation
deductive verification approach
Computer languages
Compositionality
composability
complex systems
collaboration
cognition
automated theorem provers
biblio
Intelligent System for Automatic Performance Evaluation of Distribution System Operators
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
performance evaluation procedure
personal criteria
power distribution economics
power distribution reliability
power engineering computing
power outage time minimization
power system security
pubcrawl
resilience
performance evaluation
Scalability
security
Switches
technical criteria
technical indicators
TES
Training
Tutorial Expert System
Tutorials
evaluation process
Companies
distribution system operators
distribution systems
economic criteria
Economic indicators
electrical distribution network operators
electrical network
electrical utilities
Electricity supply industry
automatic performance evaluation
expert systems
Human behavior
intelligent system
maintenance engineering
multicriteria evaluation
operation rules
operation standards
Operators Evaluation
biblio
Automotive Cyber #x2013;Physical Systems: A Tutorial Introduction
Submitted by el_wehby on Fri, 05/25/2018 - 4:22pm
Algorithm design and analysis
Automotive engineering
computer architecture
Control Theory
Program processors
Software algorithms
Tutorials
1553757
biblio
Adopting Strict Content Security Policy for XSS Protection
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Licenses
XSS protection
Web application flaw
Tutorials
security policies
security of data
script source
pubcrawl
Production
policy-based governance
Policy
collaboration
internet
Government
Governance
Google
Data protection
CSP
content-injection flaw
content security policy
Conferences
computer security
biblio
"Applying Formal Methods to Networking: Theory, Techniques, and Applications"
Submitted by grigby1 on Tue, 02/21/2017 - 12:11pm
Internet community
Tutorials
software defined networking
Software
SDN
pubcrawl170103
Protocols
networking protocols
network infrastructure
Mathematics
Internet culture
applying formal methods
Internet architecture
internet
formal verification
formal specifications
formal correctness
Computers
computer networks
Communities
clean slate Internet design
biblio
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
Submitted by BrandonB on Wed, 05/06/2015 - 11:35am
hardware-software codesign
Very large scale integration
vertical business model
Tutorials
Trojan horses
system integrity
original IC designs
life-critical systems
invasive software
integrated circuit testing
horizontal business model
Awards activities
Hardware Trojans
Hardware
electronic component supply chain
Educational institutions
counterfeit prevention
counterfeit IC
counterfeit electronic parts
counterfeit detection
Conferences
1
2
next ›
last »